?SETCONFIG@@YAXXZ
?hLOUD@@YAKK@Z
Static task
static1
Behavioral task
behavioral1
Sample
aac42876d1c6476c77f9e6fb1635ffb8154648c4ebffad974e2e2d2a07948dc5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aac42876d1c6476c77f9e6fb1635ffb8154648c4ebffad974e2e2d2a07948dc5.exe
Resource
win10v2004-20220812-en
Target
aac42876d1c6476c77f9e6fb1635ffb8154648c4ebffad974e2e2d2a07948dc5
Size
136KB
MD5
779c5186c122282f8d68a75b75330851
SHA1
9c004ff62b666a2c8dd8b9182fa1130fc241d62b
SHA256
aac42876d1c6476c77f9e6fb1635ffb8154648c4ebffad974e2e2d2a07948dc5
SHA512
2bb52662e7fcf355df5a1e07c12f29930b09833f8699aebccb1563dc838c67a7aa7a4a86aa6ac886538930b670d0325ac66b20cf9c78d1bacd31843514612d00
SSDEEP
3072:dJ3KxC3HP+jrtcCelI45nEpHvO3LjKsla2zAXcG:LKxC3PqxpelIOOv8Ln
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ReadFile
GetThreadPriority
GetProcAddress
VirtualAlloc
CloseHandle
GetModuleHandleA
GetSystemTime
SuspendThread
Sleep
SetFilePointer
GetLocaleInfoA
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
ResumeThread
GetCurrentThreadId
GetTickCount
DeleteFileA
SetStdHandle
DeleteFileW
GetStartupInfoA
GetCommandLineA
GetVersionExA
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
IsBadWritePtr
IsBadReadPtr
HeapValidate
TerminateProcess
GetCurrentProcess
ExitProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
VirtualFree
RtlUnwind
MultiByteToWideChar
VirtualProtect
GetSystemInfo
VirtualQuery
HeapAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
QueryPerformanceCounter
FlushFileBuffers
MessageBoxA
DestroyWindow
wsprintfA
LoadIconW
GetDesktopWindow
ReleaseDC
CreatePen
joyGetThreshold
AVIStreamCreate
AVIClearClipboard
?SETCONFIG@@YAXXZ
?hLOUD@@YAKK@Z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ